Sciweavers

1296 search results - page 136 / 260
» Multiplicative Background Risk
Sort
View
PPOPP
2012
ACM
13 years 8 months ago
A speculation-friendly binary search tree
We introduce the first binary search tree algorithm designed for speculative executions. Prior to this work, tree structures were mainly designed for their pessimistic (non-specu...
Tyler Crain, Vincent Gramoli, Michel Raynal
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 7 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
CVPR
2008
IEEE
16 years 2 months ago
Multi-object shape estimation and tracking from silhouette cues
This paper deals with the 3D shape estimation from silhouette cues of multiple moving objects in general indoor or outdoor 3D scenes with potential static obstacles, using multipl...
Li Guan, Jean-Sébastien Franco, Marc Pollef...
110
Voted
BMCBI
2006
199views more  BMCBI 2006»
15 years 23 days ago
PageMan: An interactive ontology tool to generate, display, and annotate overview graphs for profiling experiments
Background: Microarray technology has become a widely accepted and standardized tool in biology. The first microarray data analysis programs were developed to support pair-wise co...
Björn Usadel, Axel Nagel, Dirk Steinhauser, Y...
83
Voted
JSW
2008
106views more  JSW 2008»
15 years 21 days ago
Hierarchical Image Segmentation by Structural Content
Image quality loss resulting from artifacts depends on the nature and strength of the artifacts as well as the context or background in which they occur. In order to include the im...
Nathir A. Rawashdeh, Shaun T. Love, Kevin D. Donoh...